Analysis and Interpretation of Coronary Artery Blockage using Soft Computing Techniques
نویسندگان
چکیده
منابع مشابه
Investigating electrochemical drilling (ECD) using statistical and soft computing techniques
In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...
متن کاملinvestigating electrochemical drilling (ecd) using statistical and soft computing techniques
in the present study, five modeling approaches of ra, mlp, mnn, gff, and canfis were applied so as to estimate the radial overcut values in electrochemical drilling process. for these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. the developed models were evaluated in terms of their prediction capability with m...
متن کاملComparative Analysis of Three Tank Process using Soft Computing Techniques
Most of the process systems exhibits non-linear behaviour, so conventional controllers are not able to provide accurate data. At present, various soft computing techniques are used to overcome imprecision and uncertainty effects of conventional controllers. Various soft computing techniques like fuzzy logic, genetic algorithm and particle swarm optimization have been suggested for optimum setti...
متن کاملDamage identification by using soft-computing techniques
This paper describes a soft computing approach to solve the damage identification problem using Case-Based Reasoning (CBR) to obtain an initial diagnostic exploiting the outcomes given in known structure models simulations and the data acquired by the sensors in operating conditions once the system has started. It creates an incremental database (since a new experience is retained each time a p...
متن کاملIntrusion Detection Using Soft Computing Techniques
As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOSR Journal of Computer Engineering
سال: 2016
ISSN: 2278-8727,2278-0661
DOI: 10.9790/0661-1805027480